The Art of Mac Malware The Guide to Analyzing Malicious Software
The Art of Mac Malware The Guide to Analyzing Malicious Software
- ISBN 13:
9781718501942
- ISBN 10:
1718501943
- Format: Paperback
- Copyright: 07/12/2022
- Publisher: No Starch Press
List Price $49.99 Save
TERM | PRICE | DUE |
---|---|---|
Free Shipping Both Ways
Highlight/Take Notes Like You Own It
Purchase/Extend Before Due Date
List Price $49.99 Save $1.74
Usually Ships in 3-5 Business Days
We Buy This Book Back!
Free Shipping On Every Order
Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Extend or Purchase Your Rental at Any Time
Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.
Summary
Defenders must fully understand how malicious software works if they hope to stay ahead of the increasingly sophisticated threats facing Apple products today. The Art of Mac Malware: The Guide to Analyzing Malicious Software is a comprehensive handbook to cracking open these malicious programs and seeing what’s inside.
Discover the secrets of nation state backdoors, destructive ransomware, and subversive cryptocurrency miners as you uncover their infection methods, persistence strategies, and insidious capabilities. Then work with and extend foundational reverse-engineering tools to extract and decrypt embedded strings, unpack protected Mach-O malware, and even reconstruct binary code. Next, using a debugger, you’ll execute the malware, instruction by instruction, to discover exactly how it operates. In the book’s final section, you’ll put these lessons into practice by analyzing a complex Mac malware specimen on your own.
You’ll learn to:
A former NSA hacker and current leader in the field of macOS threat analysis, Patrick Wardle uses real-world examples pulled from his original research. The Art of Mac Malware: The Guide to Analyzing Malicious Software is the definitive resource to battling these ever more prevalent and insidious Apple-focused threats.